Advertisement

Abstract

This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defense of the US government. Through the overview, technological foundations in the projects are extracted and discussed. Additionally, this paper introduces a common framework, as an example, supporting the delivery service for RFID Tracking, Sensor Network, Video Surveillance and Image Screening, which are the major technological foundations in the Homeland Security and Defense. As providing an outline of the technological aspects of the Homeland Security and Defense, this paper is expected a reference for initiators of the related projects.

Keywords

homeland security homeland defense terror and disaster control emergency readiness cyber threats 

References

  1. 1.
    Moseley, T.M.: Homeland Operations. Air Force Doctrine Document 2(10), 9–10 (2006)Google Scholar
  2. 2.
    Sharp, W.L.: Homeland Security. JP 3-27 (2007), http://www.fas.org/irp/doddir/dod/jp3_27.pdf
  3. 3.
    Martyn, A.: The Right of Self-Defence under International Law-the Response to the Terrorist Attacks of September 11. Australian Law and Bills Digest Group (2002)Google Scholar
  4. 4.
    Ruby, C.L.: The Definition of Terrorism. In: Analyses of Social Issues and Public Policy, pp. 9–14 (2002)Google Scholar
  5. 5.
    Department of Homeland Security, http://www.dhs.gov/index.shtm
  6. 6.
    The Best Source for Digital Video and Network (IP) Security Products, http://www.cctvsentry.com/
  7. 7.
    Network camera developments enable live web imaging. White paper, Axis (1999)Google Scholar
  8. 8.
    IKebe, Oqawa, Hatayanma: Network camera system using new home network architure with flexible scalability. In: International Conference on ICCE 2005, pp. 151–152 (2005)Google Scholar
  9. 9.
    Lee, K., Yim, K., Mikki, M.: A secure framework of the surveillance video network integrating heterogeneous video formats and protocols. Submitted to be Published on the Journal of Computers and Mathematics with ApplicationsGoogle Scholar
  10. 10.
    Lee, K., Yim, K.: Safe Authentication Protocol for Secure USB Memories. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA) 1(1), 46–55 (2010)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Kangbin Yim
  • Ilsun You

There are no affiliations available

Personalised recommendations